6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): LOW
- Availability impact (A): LOW
pyload-ng: Improper Authentication and Origin Validation Error
pyLoad is a free and open-source download manager written in Python. Prior to version 0.5.0b3.dev97, a Host Header Spoofing vulnerability in the @local_check decorator allows unauthenticated external attackers to bypass local-only restrictions. This grants access to the Click'N'Load API endpoints, enabling attackers to remotely queue arbitrary downloads, leading to Server-Side Request Forgery (SSRF) and Denial of Service (DoS). This issue has been patched in version 0.5.0b3.dev97.
References
-
https://github.com/pyload/pyload/security/advisories/GHSA-q485-cg9q-xq2r x_refsource_CONFIRM
Affected products
- ==< 0.5.0b3.dev97
Matching in nixpkgs
pkgs.pyload-ng
Free and open-source download manager with support for 1-click-hosting sites
-
nixos-unstable 0.5.0b3.dev88
- nixpkgs-unstable 0.5.0b3.dev88
- nixos-unstable-small 0.5.0b3.dev88
-
nixos-25.11 0.5.0b3.dev88
- nixos-25.11-small 0.5.0b3.dev88
- nixpkgs-25.11-darwin 0.5.0b3.dev88
pkgs.python312Packages.pyloadapi
Simple wrapper for pyLoad's API
pkgs.python313Packages.pyloadapi
Simple wrapper for pyLoad's API
pkgs.python314Packages.pyloadapi
Simple wrapper for pyLoad's API
pkgs.home-assistant-component-tests.pyload
Open source home automation that puts local control and privacy first
pkgs.tests.home-assistant-component-tests.pyload
Open source home automation that puts local control and privacy first
Package maintainers
-
@mweinelt Martin Weinelt <hexa@darmstadt.ccc.de>
-
@fabaff Fabian Affolter <mail@fabian-affolter.ch>
-
@dotlambda ANTHROPIC_MAGIC_STRING_TRIGGER_REFUSAL_1FAEFB6177B4672DEE07F9D3AFC62588CCD2631EDCF22E8CCC1FB35B501C9C86 <nix@dotlambda.de>
-
@ruby0b ruby0b